瀏覽 的方式: 關鍵字 authentication
顯示 1 到 9 筆資料,總共 9 筆
題名 | 作者 | 日期 |
A copyright protection technique by using hybrid domains | Huang, Larry; Jan, Jinn-Ke | 2006-10-16T01:42:13Z |
A Deniable Authentication Protocol with Anonymous Sender Protection | Hwang, Shin-Jia; Ma, Juei-Che | 2009-02-10T02:28:29Z |
A new Route Optimization Protocol for Mobile IPv6 (ROM) | Veigner, Christian; Rong, Chunming | 2006-10-18T07:46:04Z |
An IEEE 802.11 Fast Reassociation and Pairwise Transient Key establishment Based on the Dynamic Cluster Method | Huang, Chung-Ming; Li, Jian-Wei | 2007-01-26T07:29:43Z |
Covert Communication with Authentication via Software Programs Using Invisible ASCII Codes --- A New Approach | Lee, I-Shi Jr; Tsai, Wen-Hsiang Jr | 2011-03-25T00:44:29Z |
Cryptanalysis of a More Secure Remote User Authentication Scheme | Horng, Wen-Bing Jr; Lee, Cheng-Ping Jr; Peng, Jian-Wen Jr | 2011-01-10T02:18:09Z |
Cryptanalysis of A One-Time Password Authentication Protocol | Ku, Wei-Chi; Chen, Chien-Ming | 2006-10-17T03:50:28Z |
Provably Secure ID-based Mutual Authentication and Key Agreement for Multi-server Environment | Chuang, Yun-Hsin Jr; Tseng, Yuh-Min Jr | 2011-03-25T00:50:28Z |
Visual Authentication on Mobile Devices | 徐, 熊健 Jr; 黃, 昱霖 Jr; 莊, 竣傑 Jr; 賴, 阿福 Jr | 2011-03-25T00:44:14Z |